[tbb-bugs] #15169 [Tor Browser]: Window with circuit information is too small

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Mar 9 19:40:06 UTC 2015


#15169: Window with circuit information is too small
--------------------------+------------------------------------------------
     Reporter:  qbi       |      Owner:  tbb-team
         Type:  defect    |     Status:  new
     Priority:  normal    |  Milestone:
    Component:  Tor       |    Version:
  Browser                 |   Keywords:  tbb-circuit-display, tbb-usability
   Resolution:            |  Parent ID:
Actual Points:            |
       Points:            |
--------------------------+------------------------------------------------

Comment (by arthuredelstein):

 Replying to [comment:5 arthuredelstein]:
 > Replying to [comment:1 mikeperry]:
 >
 > > It turns out this also makes it impossible to cut and paste IP
 addresses, which is also a problem. :/
 >
 > I put in a lot of effort yesterday trying to get select/copy to work.
 Mark's suggestion is a good one, but unfortunately, it doesn't work inside
 a XUL menupopup (where we have added the tor circuit display). I can move
 the tor circuit display to a separate XUL panel and then Mark's solution
 select/copy works. Unfortunately, a menupopup and a separate panel opened
 simultaneously turn out to be badly behaved in various ways.
 >
 > To make the lack of select/copy less problematic, I'm experimenting with
 the possibility of turning the IP address for each relay in the circuit
 display into a hyperlink that when clicked, opens a new tab with the
 atlas.torproject.org page for that relay.  Of course, this might have
 privacy implications, so perhaps only the exit node IP address should be
 shown/hyperlinked?
 >
 > Another, perhaps less dangerous alternative would be to extract the
 relay information from the control port and display it in a locally-
 generated tab. This would lack the pretty graphs, though.
 >
 > Any opinions?

 A couple of other considerations:
  * Both atlas and globe require JavaScript, so it can be awkward if
 JavaScript is disabled in Tor Browser.
  * Mike points out that if we were going to display our locally-generated
 tab in Tor Browser, we would need to sanitize any descriptor text to avoid
 XSS attacks. I see there is an [https://developer.mozilla.org/en-
 US/docs/Mozilla/Tech/XPCOM/Reference/Interface/nsIParserUtils HTML
 sanitizer utility] built into Firefox.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/15169#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tbb-bugs mailing list